You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Next »

Azure Active Directory Setup (AAD)

i21 Qualified Azure Group (role)

This group will contain users that will have access to i21 and will serve as their user role.

  1. Go to Azure Active Directory
  2. Click Groups
  3. Click New group
  4. In New Group form, enter the following:
    1. Group type = Security
    2. Group name = i21:[i21UserRole]

      1. Replace [i21UserRole] with any roles from i21. E.g. i21:PETRO ADMIN. Anything after "i21:" will be the role of the users in this group.

    3. Group description = The group description
    4. Membership type = Assigned
    5. Under Members, click No members selected hyperlink then add members/users.
    6. Click Create



App Registration

  1. Go to Azure Active Directory
  2. Click App registrations then New registration
  3. In Register an application form, enter the following:
    1. Name = iRely i21
    2. Supported account types = Accounts in this organizational directory only (single tenant)
    3. Redirect URI (web) = The URL of the i21 plus identityserver/. E.g. https://helpdesk.irely.com/identityserver/
    4. Click Register
  4. Go back to App registrations then select the app that you have just created (iRely i21)
  5. Click Certificates & secrets then create a secret
    1. Copy the secret
  6. Under API permissions, verify that the following are present especially those underlined ones. If not, add those permissions.



web.config

  1. Open web.config
  2. Goto Azure Active Directory
  3. Copy the values from the iRely i21 app to the web.config



Mapping existing i21 users to Azure Active Directory users


  1. Login as "security" or login using an admin user
  2. Go to System Manager → Users
  3. On Search Users screen, click Map Active Directory Users
  4. On Map Active Directory Users screen, click Template. This will download the template for mapping users.
  5. Open the template map_activedirectory_users_template.csv
    1. on i21UserName column, enter the username of the i21 user that you want to map to an Azure AD user
    2. on ExternalUserName column, enter the email/username of the Azure AD user that you want to map to an i21 user (i21UserName)
      1. Repeat these steps for multiple user mapping
      2. Note: i21UserName and ExternalUserName are case sensitive
    3. Save the file
  6. On Map Active Directory Users screen, click Browse... and search for the template then click Map
  7. That should map all the users you entered in the temple





Note: If for some reason the app redirects you to the same login page, check that the IIS application path is the same as the one you entered on the ApplicationPath and on the AzureADRedirectUri field (case sensitive).
Example:

The IIS application is BoldBIi21 and so the ApplicationPath must be the same and AzureADRedirectUri must be something like https://qc.irely.com/BoldBIi21/identityserver/.
 
The same URI must be configured in Azure Active Directory Redirect URIs ({+}https://qc.irely.com/BoldBIi21/identityserver/+). The above image shows incorrect URI and results to login redirect loop.

  • No labels